Addendum of Digital Video Watermarking MMSEC 2008.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE. CONFIDENTIAL DIGITAL WATERMARKING ALLIANCE 2 Digital Watermarking Alliance Charter The Digital Watermarking.
Advertisements

Prepared for DA 201  Introduction to Digital Watermarking.
Digital rights management Audio watermark Jiamian.
Using Multimedia on the Web Enhancing a Web Site with Sound, Video, and Applets.
Steganography and Watermarks Trust and Reputation.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
© 2000 Verance Corporation Verance Audio Watermarking Technologies for Protection of Digital Audio and Video Joseph M. Winograd, Ph.D. Verance Corporation.
Teaching and Learning with Technology to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology to edit Master title style.
DR. MIGUEL ÁNGEL OROS HERNÁNDEZ 8. Cracking. Cracking Magnitude of piracy  All kinds of digital content (music, software, movies)  Huge economic repercussions.
Analog Protection System A Presentation to the Analog Reconversion Discussion Group March 5, 2003 Analog Protection System A Presentation to the Analog.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Computer Concepts 2013 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Fifth International Conference on Information
Macrovision Video Copy Protection Paul Low CS265 Spring 2003.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
                      Digital Video 1.
Digital Video Disk (DVD) Protection “Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application.
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Making Movies An introduction to Digital Video, College customs & practices, imovie and Final Cut Pro video editing software.
Digital Watermarking Parag Agarwal
Chapter 10: Authentication Guide to Computer Network Security.
Using Multimedia on the Web
GODIAN MABINDAH RUTHERFORD UNUSI RICHARD MWANGI.  Differential coding operates by making numbers small. This is a major goal in compression technology:
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
Edward J. Delp Panasonic January 13, 2000 Slide 1 Watermarking: What is the Future? Edward J. Delp Purdue University School of Electrical and Computer.
IMA - Digital Libraries February 13, 2001 Slide 1 Multimedia Security: Is Their Hope In Securing Our Digital Future? Edward J. Delp Purdue University School.
© 2011 The McGraw-Hill Companies, Inc. All rights reserved Chapter 6: Video.
Millennium Group Update Millennium Group Update Presentation for Copy Protection Technical Working Group September 20, 2000 Presentation for Copy Protection.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
CMPD273 Multimedia System Prepared by Nazrita Ibrahim © UNITEN2002 Multimedia System Characteristic Reference: F. Fluckiger: “Understanding networked multimedia,
TCP/IP Protocol Suite 1 Chapter 25 Upon completion you will be able to: Multimedia Know the characteristics of the 3 types of services Understand the methods.
The OSI Model.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Computer Concepts 2014 Chapter 8 Digital Media. 8 Digital Audio Basics  Sampling a sound wave Chapter 8: Digital Media 2.
Tutorial 7 Working with Multimedia
Tutorial 7 Designing a Multimedia Web Site
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Multimedia Security Part I: Digital Watermarking Subrata Acharya CS 2310, Spring 2007.
MULTIMEDIA TECHNOLOGY SMM 3001 MEDIA - VIDEO. In this chapter How digital video differs from conventional analog video How digital video differs from.
Applying Digital Watermarking Technology to Control CD copying BY CHAYAN RATTANAVIJAI.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Voice Over Internet Protocol (VoIP) Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Presentation 5 – VoIP and the OSI Model.
California State University, LA Presented by Amanda Steven StevenAamirObaid.
Fall 2006CS 395: Computer Security1 Key Management.
A Partial Survey of the Perfect Digital Watermark Problem.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
Fragile Watermarking Scheme for Relational Database Fragile Watermarking Scheme for Relational Database.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Basic Concepts Video is a collection of bit-mapped still images (called frames) that are taken one after the other. When the file is played these pictures.
Chapter 6: Video.
Applying Digital Watermarking Technology to Control CD copying
Signal-Coherent Watermarking Schemes
Parag Agarwal Digital Watermarking Parag Agarwal
ONLINE SECURE DATA SERVICE
Presentation transcript:

Addendum of Digital Video Watermarking MMSEC 2008

Applications of Watermarking Video Content ApplicationsPurpose of the embedded purpose Copy controlPrevent unauthorized copying Broad casting monitoring Identity the video item being broadcasted FingerprintingTrace back a malicious user Video AuthenticationEnsure that the video hasn’t been altered Copyright ProtectionProve IPR ownership Enhanced Video Coding Bring additional information e.g. for error correction

A. Copy Control: DVD( digital versatile disk): late CSS( Content Scrambling System): Matsuhita, MPEG-2 Video A pair of keys is required for descrambling: one is unique to the disk and the other is specific to the MPEG file being descrambled. Scrambled Video is not viewable. CSS was cracked in 1999.

APS( Analog Protection System): Macrovision A modified version of NTSC/PAL video signals. The resulting video signals can be displayed on TV but cannot be recorded on VCR’s. Some bits are stored in the MPEG stream header to give the information of whether and how APS should be applied.

CGMS( Copy Generation Management System) This is a pair of bits stored in the header of an MPEG stream encoding one of the three possible rules for copying: copy-always, copy- never and copy-once. The copy-once case is included so that time- shifting recording is allowed, i.e., a copy of broadcast media is made for later viewing.

5C: A coalition of five companies designs this mechanism. It allows several compliant devices, connected to the same digital video bus, e.g. IEEE 1394 (firewire), to exchange keys in an authenticated manner so that encrypted data can be sent over the bus. Non-compliant devices do not have access to the keys and cannot decrypt the data.

Watermarking: The main purpose of watermarking is to provide a more secure solution than storing bits in the MPEG stream header. In DVD, digital watermarking is primarily intended for the CGMS bits and secondary for the APS bits.

Physical Identifiers: The idea is to design secure physical media identifiers in order to be able to distinguish between original media and copies.

Everything starts when Hollywood studios release a new copyrighted DVD with CGMS bits encoding the message copy-never. Both CSS keys are stored on the “Lean-in” area of the DVD. This area is only read by “ Compliant Players”. This prevents factory- pressed “legal disk” from being displayed by noncompliant players.

Bit-by-bit illegal copies will contain CSS Scrambled content but not the keys. As result, such illegal copies cannot be displayed by any player, compliant or not. If the output signal given by compliant players is digital, CGMS bits prevent copying in the compliant world while 5C will avoid any communication with any non compliant devices.

Nowadays, analog monitors are still widespread and even compliant players output an analog signal for compatibility. Since CGMS bits do not survive digital to analog conversion, watermarking is introduced in order to avoid copying in the compliant world. In the noncompliant world, APS only disables copying of analog NTSC/PAL signals on VHS tapes. Disks without CSS or CGMS can then easily generated ( by using a PC with a video capture card).

Now, illegal disks containing unscrambled content without CSS and CGMS are available. They may have been generated as prescribed or they may also be generated directly from an original legal disk since CSS was cracked in The remaining CGMS bits can then be trivially stripped from the MPEG stream. DeCSS gives clear MPEG streams.

Such illegal copies can of course be displayed by noncompliant players but watermarking has to be introduced in order to prevent those copies to enter the compliant world. Compliant players will detect the copy-never watermark embedded in unscrambled DVD- ROM and refuse playback.

The video signal given by a noncompliant player can be recorded by noncompliant recording devices. However, watermarking prevents copying with compliant devices. The whole protection system results in two hermetically separated worlds. A consumer should have both types of players in order to display legal and illegal disks. The expense of such a strategy will help to “ keep honest people honest”.

Legal Disk (CSS) Illegal Disk (CSS) Illegal Disk (No CSS) Compliant Player Non-Compliant Player CSS Playback Control CSS APS,5C CGMS Recordin g control Compliant recorder Non-compliant record DVD Copy-protection System

B. Broadcasting monitoring Passive monitoring: Human or computer simulated observer monitors the broadcasts and compares the received signals with a database of known videos. Active monitoring: Transmit computer recognizable identification information(i.e. the watermark) along with the broadcasting videos.

C. Fingerprinting: Download video content over Internet through peer-to-peer systems By embedding an indelible and invisible watermark to identify the traitor when an illegal copy is found. The technique is getting more attention recently because of the popularity and maturity of video streaming applications, such as PPV (Pay-per- View) and VOD(Video-on-Demand).

In both applications, digital watermarking (user ID) is embedded into the delivered video data in order to trace back any user breaking his/her license agreement. Embedding the watermark on the customer side has been suggested but it should be avoided if possible in order to prevent reverse engineering.

In a ppv environment, a video server multicasts some videos and customers have only to connect to the server in order to obtain the video. The video server is passive. In order to enforce fingerprinting, one has to embed a piece of watermark to each network element (router, node or whatever ) as the video stream is related. The resulting watermark will contain a trace of the route followed by the video stream. Such a strategy requires the support from network providers.

In a VDD framework, the video server is active. It receives a request from a customer and sends the required video. It is a multi-unicast strategy. This time, the video server can insert a watermark identifying the customer since each connection is dedicated to only one customer. The main challenge is then to scale the system to many users.

Nowadays, illegal copying of brand new movies projected onto cinema screen by means of a handheld video camera has become a common practice ---- with visible head shadows of audience members. A watermark can be embedded during show time identifying the cinema, the presentation date and time. If an illegal copy created with a video camera is found, the watermark is extracted and the cinema to blame is identified. After many blames, the cinema is sanctioned with a ban on the availability of content.

Popular Video Editing softwares permit to easily temper with video content so that video content is no more reliable. In some countries, a video shot taken from a surveillance camera cannot be used as a piece of evidence in a courtroom because it is not considered trust- worthy emough. Authentication techniques are needed to ensure authenticity of video content. D. Video Authentication

Video authentication might prefer to allow some distortions on the digital data if the original content has not been significantly modified: fragile vs. Semi- fragile watermarks! A basic approach consists in regularly embedding an incremental timestamp to the frames of the video. As a result, frame cuts, foreign frame insertion, frame swapping, and frame rate alteration can be easily detected temporal alternation of the video stream.

The above approach might fail in detecting alternations of the content itself, e.g., a character is completely removed from a movie. One proposal embeds the edge map of each frame to the video stream. During the verification process, if the video content has been modified, there will be a mismatch between the extracted edge map from the verified video and the watermarked edge map.

Another proposal exploits the fact that a movie is made up of one audio and one video stream and that both need to protected against unauthorized tempering. By combining video and audio watermarking to obtain an efficient authentication system. Modifications from either the sound track, or the video track, is immediately spotted by the detector, since the extracted and watermarked features will differ.

historically the very first target applications for digital watermarking. Deadlock problem: If an attacker adds a second watermark into a video clip, both the original owner and the attacker can claim ownership and therefore defeat the purpose of using watermark a trusted third party is required to build an application watermarking protocol.( Buyer-Seller Protocol.) E. Copyright Protection :

Video watermarking and video coding are two conflicting technologies. However, recent research has shown that digital watermarking can benefit to the coding community. The video coding process can be sequenced in two steps: Source coding : any redundant information is removed in order to obtain the most possible compressed representation of the dada while keeping its original visual quality. F. Enhanced Video Coding

Channel coding: extra redundant information is added for error correction. Digital watermarking can be introduced as an alternative solution for introducing error correcting information after source coding, without inducing any overhead. Experiments have demonstrated that digital watermarking can have a better error correcting performance than traditional error correction mechanisms.

Embedding useful data directly into the video stream can spare much storage space. A typical video stream is made up of two different parallel streams : the audio and video streams. Those two streams need to be synchronized during playback for pleasant viewing, which is difficult to maintain during cropping operations. Hiding the audio stream into the video one will implicitly provide efficient and robust synchronization, while significantly reducing the required storage need or available bandwidth.

Picture-in-picture system can be improved by hiding a video stream into another one. During playback, the watermark is extracted and the embedded video is displayed in a window within the host video. With such an approach, only one stream needs to be transmitted. This approach can be extended so that a user can switch to the PG version of an R-rated movie, with alternative dialogs and senses replacing inappropriate content.

There are 3 major challenges for digital video watermarking. (1) there are many non-hostile video processing, which are likely to alter the watermark signal. (2) resilience to collusion is much more critical in the content of video. (3) real-time digital video watermarking [II]. Challenges in Video Watermarking

(i) Photometric attack : the attacks modify the pixel values in the frame. ‧ Noise addition, DA/AD conversion ‧ Gamma correction ‧ Trans-coding and video format conversion ‧ Intra and Inter-frames filtering ‧ Chrominance resampling (4:4:4, 4:2:2, 4:2:0) a.Various non-hostile Video Processing

(ii) Spatial desynchronization : many watermarking algorithms rely on an implicit spatial synchronization between the embedder and the detector. ‧ Changes across display formats (4/3, 16/9, 2.11/1) ‧ Changes of spatial resolution (NTSC, PAL, SECAM) ‧ Positional jitter ‧ Handheld camera attack (video stabilization) (iii) Temporal desynchronization : ‧ Changes of frame rate

(iv) Video editing : ‧ Cut-and-splice and cut-insert-splice ‧ Fade-and-dissolve and wipe-and-matte ‧ Graphic overlay (subtitles, logo) : Commercial insertion

A set of malicious users who merge their knowledge, i.e., different watermarked data, in order to produce illegal content, i.e., unwatermarked data. Collusion Type I: The same watermark is embedded into different copies of different data. The collusion can estimate the watermark from each watermarked data and obtain a refined estimate of the watermark by linear combination, e.g. the average, of the individual estimations. Having a good estimate of the watermark permits to obtain unwatermarked data with a simple subtraction with the watermarked one. b. Resilience against Collusion

Collusion Type II: Different watermarks are embedded into different copies of the same data. The collusion only has to make a linear combination of the different watermarked data, e.g. the average, to produce un watermarked data. Indeed, generally, averaging different watermarks converges toward zero.

Inter-videos Collusion: A set of users have a watermarked version of a video which they gather in order to produce unwatermarked video content. Intra-video Collusion: Watermarking video comes down to watermarking series of still images.

In order to meet the real-time requirement, the complexity of the watermarking algorithm should obviously be as few as possible. Moreover, if the watermark can be inserted directly into the compressed stream, this will prevent full decompression and recompression consequently, it will reduce computational needs. — VLCs based Video Labelling. C. Real-time Watermarking